More on this book
Community
Kindle Notes & Highlights
the Internet was mostly made of, by, and for the people. Its purpose was to enlighten, not to monetize, and it was administered more by a provisional cluster of perpetually shifting collective norms than by exploitative, globally enforceable terms of service agreements. To this day, I consider the 1990s online to have been the most pleasant and successful anarchy I’ve ever experienced.
That, ultimately, is the critical flaw or design defect intentionally integrated into every system, in both politics and computing: the people who create the rules have no incentive to act against themselves.
To hack a system requires getting to know its rules better than the people who created it or are running it, and exploiting all the vulnerable distance between how those people had intended the system to work and how it actually works, or could be made to work. In capitalizing on these unintentional uses, hackers aren’t breaking the rules as much as debunking them.
You should always let people underestimate you. Because when people misappraise your intelligence and abilities, they’re merely pointing out their own vulnerabilities—the gaping holes in their judgment that need to stay open if you want to cartwheel through later on a flaming horse, correcting the record with your sword of justice.
We can’t erase the things that shame us, or the ways we’ve shamed ourselves, online. All we can do is control our reactions—whether we let the past oppress us, or accept its lessons, grow, and move on.
From the vantage of the corporate boardroom, contracting functions as governmentally assisted corruption. It’s America’s most legal and convenient method of transferring public money to the private purse.
Technology doesn’t have a Hippocratic oath. So many decisions that have been made by technologists in academia, industry, the military, and government since at least the Industrial Revolution have been made on the basis of “can we,” not “should we.” And the intention driving a technology’s invention rarely, if ever, limits its application and use.
When we choose to store our data online, we’re often ceding our claim to it. Companies can decide what type of data they will hold for us, and can willfully delete any data they object to.